The outburst growth and the wide accessibility of the internet has aroused gush of investigate motion in the area of information retrieval on the Web. Due to expansion of internet, it is necessary to remain locational competence to attract user needs. The internet provides a rich source of information which are surrounded has involvement of links and further of hyperlinks through which they are linked hence communicate. So idea of page ranking comes into picture to retrieve authentic data from the web. Its basic role is to calculate the priority and nature of web pages. This paper represents the revised version of page rank using the same classical recipe and added some more ingredients like time, backlinks, navigation, synonym to make it more tempting to the users which has inattentive limit as contrasted with vintage Page Rank Algorithm. Although a speedy for data extraction is yet in demand
{"title":"Modified Page Rank Algorithm: Efficient Version of Simple Page Rank with Time, Navigation and Synonym Factor","authors":"T. Sen, D. K. Chaudhary, T. Choudhury","doi":"10.1109/CINE.2017.24","DOIUrl":"https://doi.org/10.1109/CINE.2017.24","url":null,"abstract":"The outburst growth and the wide accessibility of the internet has aroused gush of investigate motion in the area of information retrieval on the Web. Due to expansion of internet, it is necessary to remain locational competence to attract user needs. The internet provides a rich source of information which are surrounded has involvement of links and further of hyperlinks through which they are linked hence communicate. So idea of page ranking comes into picture to retrieve authentic data from the web. Its basic role is to calculate the priority and nature of web pages. This paper represents the revised version of page rank using the same classical recipe and added some more ingredients like time, backlinks, navigation, synonym to make it more tempting to the users which has inattentive limit as contrasted with vintage Page Rank Algorithm. Although a speedy for data extraction is yet in demand","PeriodicalId":236972,"journal":{"name":"2017 3rd International Conference on Computational Intelligence and Networks (CINE)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126043775","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
T. Choudhury, Ayushi Gupta, Saurabh Pradhan, Praveen Kumar, Y. Rathore
The IoT is in need of an advanced prototype for security, which considers the security issues from a holistic perspective comprising the advanced users and their intercommunication with this technology. In this paper, it has been analyzed and compared how current approaches are ensuring fundamental and basic secu-rity requisites and securing intercommunication of IoT, along with the rolling challenges and scope for research work in this field in the coming future. Cloud Computing is today's generation advanced technology services are made available for customers per utilization basis. Servers are being utilized on cloud to out-source their highly valuable data. Though there are many benefits of cloud computing. However, it has security threads of pivotal confidential data. Users of cloud technology can't count on the cloud service sup-pliers for the safety of the pivotal confidential data. Therefore, a Third-Party Authenticator is required which authenticates the cloud data from the side of users or holders of the data. Security of sensitive data is of questionable nature due to the presence of various entities. Cloud Service Providers along with Data Users are equally in charge for putting the security of the pivotal confidential data at risk. Surveys have sug-gested that huge storage systems cannot be trusted completely; and all of them can be hacked.
{"title":"Privacy and Security of Cloud-Based Internet of Things (IoT)","authors":"T. Choudhury, Ayushi Gupta, Saurabh Pradhan, Praveen Kumar, Y. Rathore","doi":"10.1109/CINE.2017.28","DOIUrl":"https://doi.org/10.1109/CINE.2017.28","url":null,"abstract":"The IoT is in need of an advanced prototype for security, which considers the security issues from a holistic perspective comprising the advanced users and their intercommunication with this technology. In this paper, it has been analyzed and compared how current approaches are ensuring fundamental and basic secu-rity requisites and securing intercommunication of IoT, along with the rolling challenges and scope for research work in this field in the coming future. Cloud Computing is today's generation advanced technology services are made available for customers per utilization basis. Servers are being utilized on cloud to out-source their highly valuable data. Though there are many benefits of cloud computing. However, it has security threads of pivotal confidential data. Users of cloud technology can't count on the cloud service sup-pliers for the safety of the pivotal confidential data. Therefore, a Third-Party Authenticator is required which authenticates the cloud data from the side of users or holders of the data. Security of sensitive data is of questionable nature due to the presence of various entities. Cloud Service Providers along with Data Users are equally in charge for putting the security of the pivotal confidential data at risk. Surveys have sug-gested that huge storage systems cannot be trusted completely; and all of them can be hacked.","PeriodicalId":236972,"journal":{"name":"2017 3rd International Conference on Computational Intelligence and Networks (CINE)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128293791","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
This paper presents an acknowledgement based system for disaster management by utilizing wireless sensor network, which sense the environmental change and based on that communicate between the nodes. For the communication purpose, Low Energy Adaptive Clustering Hierarchy (LEACH) algorithm has been used. The LEACH algorithm is hierarchical in nature and therefore, helps in maintaining connection among the nodes, which leads to effective communication. Disaster is an activity, which can occur anytime and anywhere without prior information, which affects the whole mankind, human, animal and their prosperity. Since, disaster is a natural activity, no one can stop it, but a system can be developed to alert the people before the occurrence, so that many lives can be saved. The focus of this paper is towards utilizing the sensor network and LEACH algorithm for the development of an alert system, which works on the temperature. A threshold based mechanism is used to save the energy that is the system works only when the temperature reaches to its threshold value otherwise do not waste the energy by routing the data continuously.
{"title":"An Acknowledgement Based System for Forest Fire Detection via Leach Algorithm","authors":"Shruti Gupta, Lekha Doshi","doi":"10.1109/CINE.2017.16","DOIUrl":"https://doi.org/10.1109/CINE.2017.16","url":null,"abstract":"This paper presents an acknowledgement based system for disaster management by utilizing wireless sensor network, which sense the environmental change and based on that communicate between the nodes. For the communication purpose, Low Energy Adaptive Clustering Hierarchy (LEACH) algorithm has been used. The LEACH algorithm is hierarchical in nature and therefore, helps in maintaining connection among the nodes, which leads to effective communication. Disaster is an activity, which can occur anytime and anywhere without prior information, which affects the whole mankind, human, animal and their prosperity. Since, disaster is a natural activity, no one can stop it, but a system can be developed to alert the people before the occurrence, so that many lives can be saved. The focus of this paper is towards utilizing the sensor network and LEACH algorithm for the development of an alert system, which works on the temperature. A threshold based mechanism is used to save the energy that is the system works only when the temperature reaches to its threshold value otherwise do not waste the energy by routing the data continuously.","PeriodicalId":236972,"journal":{"name":"2017 3rd International Conference on Computational Intelligence and Networks (CINE)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128991559","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
A relatively new technology, palmprint recognition, has evolved drastically over the recent years. It is currently considered to be one of the potential research topics due to the escalating need of biometric authentication based security systems. This paper presents a method of authentication of hand images by relaxed collaborative representation (RCR) model of classification. It makes use of the similarity as well as uniqueness of the associated features. By computing the radon transform of the images, the feature vectors of the images are computed. The coding of each feature vector is done over the dictionary that is linked with RCR and in order to compute the resemblance among features the inconsistency of coding vectors is reduced. The main aim is to develop an efficient system whose results can be implemented on any database.
{"title":"Palmprint Recognition Using Radon Transform and Relaxed Collaborative Representation Based Classifier","authors":"Soumee Guha, D. Basu, A. Chatterjee","doi":"10.1109/CINE.2017.26","DOIUrl":"https://doi.org/10.1109/CINE.2017.26","url":null,"abstract":"A relatively new technology, palmprint recognition, has evolved drastically over the recent years. It is currently considered to be one of the potential research topics due to the escalating need of biometric authentication based security systems. This paper presents a method of authentication of hand images by relaxed collaborative representation (RCR) model of classification. It makes use of the similarity as well as uniqueness of the associated features. By computing the radon transform of the images, the feature vectors of the images are computed. The coding of each feature vector is done over the dictionary that is linked with RCR and in order to compute the resemblance among features the inconsistency of coding vectors is reduced. The main aim is to develop an efficient system whose results can be implemented on any database.","PeriodicalId":236972,"journal":{"name":"2017 3rd International Conference on Computational Intelligence and Networks (CINE)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133922593","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}